Tag: ransomware

CyberEdge Group, a premier research and marketing firm serving the security industry’s top vendors, today announced immediate availability of its fifth annual Cyberthreat Defense Report.

New this year, the report found that 55 percent of responding organizations were compromised by ransomware in 2017, down from 61 percent in 2016.

However, respondents who were victimized by ransomware and who elected to pay the ransoms (customarily using Bitcoin) were asked if they successfully recovered their compromised data. Surprisingly, only half confirmed successful data recovery, while the other half acknowledged complete data loss.

With 1,200 IT security decision makers and practitioners participating from 17 countries, six continents, and 19 industries, CyberEdge’s Cyberthreat Defense Report is the most comprehensive study of security professionals’ perceptions in the industry. This study provides a 360-degree view of organizations’ security threats, current defenses, and planned investments.

“Got a coin? Flip it to see if you’ll get your data back after paying a ransom associated with ransomware. That’s just plain scary,” said Steve Piper, CEO of CyberEdge Group. “In 2017, 55 percent of our respondents’ organizations were victimized by ransomware. Of those victims that refused to pay the ransom (61 percent), the vast majority (87 percent) recovered their data from backups. This just underscores how important it is to incorporate a sensible data backup strategy as part of an organization’s cyberthreat defense strategy.”

“The 2018 Cyberthreat Defense Report is the result of one of the few independent surveys of security practitioners. While many leading vendors provide their own research of the cybersecurity space, it is important to supplement their findings and conclusions with unbiased research and analysis such as the Cyberthreat Defense Report,” said Richard Stiennon, chief research analyst at IT-Harvest. “The leveling off of the percent of respondents reporting breaches is a good sign, but at 77.2 percent, it is still very high and paints a picture of no end in sight for serious breaches in the coming years. I hope all security teams show this to their senior leadership.”

The Oxford English Dictionary added 1,100 new entries in its January 2018 update. Wordsmiths the world over now have the official go-ahead to use ransomware, EULA, and mansplain, which should make life easier for misogynistic IT security experts. Tech terms like e-address (who says that?) and esc (not to be confused with ESC, even though they’re the same thing) made the list, but for once it wasn’t all about OMGs and LOLs. The clear star of the January update is the word “ransomware,” which after being on a lot of computers in 2017 deserves a spot in the “definitive record…

A new ransomware attack named BadRabbit is spreading through Russia, Ukraine, and other Eastern European countries. Targeting corporate networks, computer systems for the Kiev Metro, Ukraine’s Odessa International Airport, several Russian media outlets, and others have been affected, with systems encrypted and computers displaying a ransom message.

There's a new ransomware making the rounds today with confirmed targets in Russia, Ukraine, Turkey and Germany. Kaspersky Labs says that nearly 200 victims have been hit with the ransomware that's been dubbed Bad Rabbit.Engadget RSS Feed

MalwareTech, the security researcher who stopped the spread of WannaCry ransomware, has been detained following a trip to DEF CON in Las Vegas. A friend, who spoke to Motherboard under condition of anonymity, said, I’ve spoken to the US Marshals again and they say they have no record of [MalwareTech] being in the system. At this point we’ve been trying to get in contact with [MalwareTech] for 18 hours and nobody knows where he’s been taken. The friend added that, when they attempted to visit MalwareTech shortly after he was first detained, he’d already been moved. No one seems to know what…